{"title":"企业保安工作坊","authors":"Y. Al-Salqan","doi":"10.1109/WETICE.1996.10018","DOIUrl":null,"url":null,"abstract":"Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of the excitement lies a mine of technical and commercial challenges, and without solving these challenges, secure systems will not reach their expected potential. There are many securityand cryptography-related conferences held in which mostly theoretical or commercial promotion topics are discussed. The Enterprise Security Workshop, however, focuses on the total challenge of building complete end-to-end security in an enterprise. This includes building the secure infrastructure on top of which the secure applications flourish. Specific emphasis in this year’s workshop was placed on the security effort of the Internet Engineering Task Force (IEFT). The best two papers of this workshop will be published in the IEEE Internet Computing Journal.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Workshop On Enterprise Security\",\"authors\":\"Y. Al-Salqan\",\"doi\":\"10.1109/WETICE.1996.10018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of the excitement lies a mine of technical and commercial challenges, and without solving these challenges, secure systems will not reach their expected potential. There are many securityand cryptography-related conferences held in which mostly theoretical or commercial promotion topics are discussed. The Enterprise Security Workshop, however, focuses on the total challenge of building complete end-to-end security in an enterprise. This includes building the secure infrastructure on top of which the secure applications flourish. Specific emphasis in this year’s workshop was placed on the security effort of the Internet Engineering Task Force (IEFT). The best two papers of this workshop will be published in the IEEE Internet Computing Journal.\",\"PeriodicalId\":334410,\"journal\":{\"name\":\"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1997-06-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WETICE.1996.10018\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WETICE.1996.10018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of the excitement lies a mine of technical and commercial challenges, and without solving these challenges, secure systems will not reach their expected potential. There are many securityand cryptography-related conferences held in which mostly theoretical or commercial promotion topics are discussed. The Enterprise Security Workshop, however, focuses on the total challenge of building complete end-to-end security in an enterprise. This includes building the secure infrastructure on top of which the secure applications flourish. Specific emphasis in this year’s workshop was placed on the security effort of the Internet Engineering Task Force (IEFT). The best two papers of this workshop will be published in the IEEE Internet Computing Journal.